Socket.hx 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. package sys.ssl;
  2. import sys.ssl.Lib;
  3. import sys.ssl.Key.KeyPtr;
  4. import sys.ssl.Certificate.CertificatePtr;
  5. import sys.net.Socket.SocketHandle;
  6. private typedef ConfigPtr = hl.Abstract<"mbedtls_ssl_config">;
  7. private typedef ContextPtr = hl.Abstract<"mbedtls_ssl_context">;
  8. @:keep
  9. private class SNICbResult {
  10. public var cert : CertificatePtr;
  11. public var key : KeyPtr;
  12. public function new( cert : Certificate, key : Key ){
  13. this.cert = @:privateAccess cert.__x;
  14. this.key = @:privateAccess key.__k;
  15. }
  16. }
  17. private class SocketInput extends haxe.io.Input {
  18. @:allow(sys.ssl.Socket) private var __s : Socket;
  19. public function new( s : Socket ) {
  20. this.__s = s;
  21. }
  22. public override function readByte() {
  23. __s.handshake();
  24. var r = ssl_recv_char( @:privateAccess __s.ssl );
  25. if( r == -1 )
  26. throw haxe.io.Error.Blocked;
  27. else if( r < 0 )
  28. throw new haxe.io.Eof();
  29. return r;
  30. }
  31. public override function readBytes( buf : haxe.io.Bytes, pos : Int, len : Int ) : Int {
  32. if( pos < 0 || len < 0 || ((pos+len):UInt) > (buf.length : UInt) )
  33. throw haxe.io.Error.OutsideBounds;
  34. __s.handshake();
  35. var r = ssl_recv( @:privateAccess __s.ssl, @:privateAccess buf.b, pos, len );
  36. if( r == -1 )
  37. throw haxe.io.Error.Blocked;
  38. else if( r < 0 )
  39. throw new haxe.io.Eof();
  40. return r;
  41. }
  42. public override function close() {
  43. super.close();
  44. if( __s != null ) __s.close();
  45. }
  46. @:hlNative("ssl","ssl_recv") static function ssl_recv( ssl : ContextPtr, bytes : hl.Bytes, pos : Int, len : Int ) : Int { return -1; }
  47. @:hlNative("ssl","ssl_recv_char") static function ssl_recv_char( ssl : ContextPtr ) : Int { return -1; }
  48. }
  49. private class SocketOutput extends haxe.io.Output {
  50. @:allow(sys.ssl.Socket) private var __s : Socket;
  51. public function new( s : Socket ) {
  52. this.__s = s;
  53. }
  54. public override function writeByte( c : Int ) {
  55. __s.handshake();
  56. var r = ssl_send_char( @:privateAccess __s.ssl, c);
  57. if( r == -1 )
  58. throw haxe.io.Error.Blocked;
  59. else if( r < 0 )
  60. throw new haxe.io.Eof();
  61. }
  62. public override function writeBytes( buf : haxe.io.Bytes, pos : Int, len : Int) : Int {
  63. if( pos < 0 || len < 0 || ((pos+len):UInt) > (buf.length : UInt) )
  64. throw haxe.io.Error.OutsideBounds;
  65. __s.handshake();
  66. var r = ssl_send( @:privateAccess __s.ssl, @:privateAccess buf.b, pos, len);
  67. if( r == -1 )
  68. throw haxe.io.Error.Blocked;
  69. else if( r < 0 )
  70. throw new haxe.io.Eof();
  71. return r;
  72. }
  73. public override function close() {
  74. super.close();
  75. if( __s != null ) __s.close();
  76. }
  77. @:hlNative("ssl","ssl_send") static function ssl_send( ssl : ContextPtr, bytes : hl.Bytes, pos : Int, len : Int ) : Int { return -1; }
  78. @:hlNative("ssl","ssl_send_char") static function ssl_send_char( ssl : ContextPtr, c : Int ) : Int { return -1; }
  79. }
  80. @:coreApi @:access(sys.net.Socket)
  81. class Socket extends sys.net.Socket {
  82. public static var DEFAULT_VERIFY_CERT : Null<Bool> = true;
  83. public static var DEFAULT_CA : Null<Certificate>;
  84. private var conf : ConfigPtr;
  85. private var ssl : ContextPtr;
  86. public var verifyCert : Null<Bool>;
  87. private var caCert : Null<Certificate>;
  88. private var hostname : String;
  89. private var ownCert : Null<Certificate>;
  90. private var ownKey : Null<Key>;
  91. private var altSNIContexts : Null<Array<{match: String->Bool, key: Key, cert: Certificate}>>;
  92. private var sniCallback : hl.Bytes -> SNICbResult;
  93. private var handshakeDone : Bool;
  94. private var isBlocking : Bool = true;
  95. private override function init() : Void {
  96. __s = sys.net.Socket.socket_new( false );
  97. input = new SocketInput( this );
  98. output = new SocketOutput( this );
  99. if( DEFAULT_VERIFY_CERT && DEFAULT_CA == null ){
  100. try {
  101. DEFAULT_CA = Certificate.loadDefaults();
  102. }catch( e : Dynamic ){}
  103. }
  104. verifyCert = DEFAULT_VERIFY_CERT;
  105. caCert = DEFAULT_CA;
  106. }
  107. public override function connect(host : sys.net.Host, port : Int) : Void {
  108. conf = buildConfig( false );
  109. ssl = ssl_new( conf );
  110. ssl_set_socket( ssl, __s );
  111. handshakeDone = false;
  112. if( hostname == null )
  113. hostname = host.host;
  114. if( hostname != null )
  115. ssl_set_hostname( ssl, @:privateAccess hostname.toUtf8() );
  116. if( !sys.net.Socket.socket_connect( __s, host.ip, port ) )
  117. throw new Sys.SysError("Failed to connect on "+host.toString()+":"+port);
  118. if( isBlocking )
  119. handshake();
  120. }
  121. public function handshake() : Void {
  122. if( !handshakeDone ){
  123. var r = ssl_handshake( ssl );
  124. if( r == 0 )
  125. handshakeDone = true;
  126. else if( r == -1 )
  127. throw haxe.io.Error.Blocked;
  128. else
  129. throw new haxe.io.Eof();
  130. }
  131. }
  132. override function setBlocking( b : Bool ) : Void {
  133. super.setBlocking(b);
  134. isBlocking = b;
  135. }
  136. public function setCA( cert : Certificate ) : Void {
  137. caCert = cert;
  138. }
  139. public function setHostname( name : String ) : Void {
  140. hostname = name;
  141. }
  142. public function setCertificate( cert : Certificate, key : Key ) : Void {
  143. ownCert = cert;
  144. ownKey = key;
  145. }
  146. public override function close() : Void {
  147. if( ssl != null ) ssl_close( ssl );
  148. if( conf != null ) conf_close( conf );
  149. if( altSNIContexts != null )
  150. sniCallback = null;
  151. sys.net.Socket.socket_close( __s );
  152. var input : SocketInput = cast input;
  153. var output : SocketOutput = cast output;
  154. @:privateAccess input.__s = output.__s = null;
  155. input.close();
  156. output.close();
  157. }
  158. public function addSNICertificate( cbServernameMatch : String->Bool, cert : Certificate, key : Key ) : Void {
  159. if( altSNIContexts == null )
  160. altSNIContexts = [];
  161. altSNIContexts.push( {match: cbServernameMatch, cert: cert, key: key} );
  162. }
  163. public override function bind( host : sys.net.Host, port : Int ) : Void {
  164. conf = buildConfig( true );
  165. sys.net.Socket.socket_bind( __s, host.ip, port );
  166. }
  167. public override function accept() : Socket {
  168. var c = sys.net.Socket.socket_accept( __s );
  169. var cssl = ssl_new( conf );
  170. ssl_set_socket( cssl, c );
  171. var s = Type.createEmptyInstance( sys.ssl.Socket );
  172. s.__s = c;
  173. s.ssl = cssl;
  174. s.input = new SocketInput(s);
  175. s.output = new SocketOutput(s);
  176. s.handshakeDone = false;
  177. return s;
  178. }
  179. public function peerCertificate() : sys.ssl.Certificate {
  180. var x = ssl_get_peer_certificate( ssl );
  181. return x==null ? null : new sys.ssl.Certificate( x );
  182. }
  183. private function buildConfig( server : Bool ) : ConfigPtr {
  184. var conf = conf_new( server );
  185. if( ownCert != null && ownKey != null )
  186. conf_set_cert( conf, @:privateAccess ownCert.__x, @:privateAccess ownKey.__k );
  187. if ( altSNIContexts != null ) {
  188. sniCallback = function(servername:hl.Bytes) : SNICbResult {
  189. var servername = @:privateAccess String.fromUTF8(servername);
  190. for( c in altSNIContexts ){
  191. if( c.match(servername) )
  192. return new SNICbResult(c.cert, c.key);
  193. }
  194. if( ownKey != null && ownCert != null )
  195. return new SNICbResult(ownCert, ownKey);
  196. return null;
  197. }
  198. conf_set_servername_callback( conf, sniCallback );
  199. }
  200. if ( caCert != null )
  201. conf_set_ca( conf, caCert == null ? null : @:privateAccess caCert.__x );
  202. conf_set_verify( conf, if( verifyCert ) 1 else if( verifyCert==null ) 2 else 0 );
  203. return conf;
  204. }
  205. @:hlNative("ssl","ssl_new") static function ssl_new( conf : ConfigPtr ) : ContextPtr { return null; }
  206. @:hlNative("ssl","ssl_close") static function ssl_close( ssl : ContextPtr ) : Void {}
  207. @:hlNative("ssl","ssl_handshake") static function ssl_handshake( ssl : ContextPtr ) : Int { return -1; }
  208. @:hlNative("ssl","ssl_set_socket") static function ssl_set_socket( ssl : ContextPtr, socket : SocketHandle ) : Void { }
  209. @:hlNative("ssl","ssl_set_hostname") static function ssl_set_hostname( ssl : ContextPtr, name : hl.Bytes ) : Void { }
  210. @:hlNative("ssl","ssl_get_peer_certificate") static function ssl_get_peer_certificate( ssl : ContextPtr ) : CertificatePtr { return null; }
  211. @:hlNative("ssl","conf_new") static function conf_new( server : Bool ) : ConfigPtr { return null; }
  212. @:hlNative("ssl","conf_close") static function conf_close( conf : ConfigPtr ) : Void { }
  213. @:hlNative("ssl","conf_set_ca") static function conf_set_ca( conf : ConfigPtr, ca : CertificatePtr ) : Void { }
  214. @:hlNative("ssl","conf_set_verify") static function conf_set_verify( conf : ConfigPtr, mode : Int ) : Void { }
  215. @:hlNative("ssl","conf_set_cert") static function conf_set_cert( conf : ConfigPtr, cert : CertificatePtr, pkey : KeyPtr ) : Void { }
  216. @:hlNative("ssl","conf_set_servername_callback") static function conf_set_servername_callback( conf : ConfigPtr, cb : hl.Bytes -> SNICbResult ) : Void { }
  217. }